Securing collaboration

The authors suggest and elaborate on four categories to secure collaboration:

Computer security and privacy technologies
Which consists of measures for access control and secure multi-party computation, where computations can be done on multiple datasets without revealing the underlying information. Furthermore privacy-preserving location-based services are summarized here.

Information partitioning
This contains the aspects of document classification and risk management.

Last but not least figure 5 summarizes the current state of the art for the above mentioned problems and potential future research directions.Figure 5: Future Research Directions on Secure Collaboration (Zeng et al., 2012)

Conclusion

The authors take the view of a computer scientist and find technical solutions (like secure multi-party computation) to fight supply chain problems.
One of the first things that came to my mind: “One cannot use technology to solve social problems.”
I do think that those measures should be pursued further in research as well as business. But the first steps have to be done by describing and defining their individual information buckets, by answering the strategic question: What information is core to our business and should be protected and what can be shared?

Several obstacles to supply chain collaboration often prohibit an efficient resource allocation. This article discusses the problem and shows technological and social measures to mitigate some of the issues.